Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

BMC Software Podcasts

show episodes
 
Do you often wonder what’s the best way to architect, upgrade, or configure your monitoring solution? The BMC Performance and Availability Business Unit is providing a series of best practices content for its BMC ProactiveNet Performance Management (BPPM) and TrueSight Infrastructure Management solutions. Content delivered in each session gives guidance for specific areas of the solution and functionality for the releases by version. Each recording is designed to provide a solid foundation f ...
  continue reading
 
Do you often wonder what’s the best way to architect, upgrade, or configure your capacity solution? The BMC Performance and Availability Business Unit is providing a series of best practices content for its BMC Capacity Optimization (BCO) and TrueSight Capacity Optimization (TSCO) solutions. Content delivered in each session gives guidance for specific areas of the solution and functionality for the releases by version. Each recording is designed to provide a solid foundation for success and ...
  continue reading
 
Retention is the new growth & AI is rewriting the rules. Hosted by Josh Schachter, SVP of Atlas at Gainsight, [Un]Churned—the No. 1 podcast for retention and Customer Success leaders—features real talk with the sharpest minds in the Customer Success space. We dig into how teams are scaling smarter, activating AI agents, and redesigning the customer journey for lasting impact. If you're experimenting with automation, questioning the traditional post-sales model, or trying to drive more value ...
  continue reading
 
The Develop[Her] Show is a career development podcast for tech women by tech women. In each episode Lauren Hasson, Founder of Develop[Her], host, and a technical woman herself, interviews leading tech woman about their careers and lessons learned to peel back the curtain and show you what it really takes to forge a path in the tech world and to be the CEO of your own career.You don’t need to dive in blind. Instead, use lessons shared in The Show as vehicles to earn more, gain more influence, ...
  continue reading
 
Loading …
show series
 
How Human-Centric AI Frees CSMs for Strategic Work at BMC Leading customer success at a global scale is never easy—especially after a company split. For Sofia Barbosa, this meant steering a leaner team while still supporting hundreds of BMC products worldwide. The challenge: deliver more impact with fewer hands. The solution: build Succedo, an AI p…
  continue reading
 
More .well-known scans Attackers are using API documentation automatically published in the .well-known directory for reconnaissance. https://isc.sans.edu/diary/More%20.well-known%20Scans/32340 RedHat Patches Openshift AI Services A flaw was found in Red Hat Openshift AI Service. A low-privileged attacker with access to an authenticated account, fo…
  continue reading
 
Comparing Honeypot Passwords with HIBP Most passwords used against our honeypots are also found in the Have I been pwn3d list. However, the few percent that are not found tend to be variations of known passwords, extending them to find likely mutations. https://isc.sans.edu/diary/%5BGuest%20Diary%5D%20Comparing%20Honeypot%20Passwords%20with%20HIBP/…
  continue reading
 
"How Agentic AI Is Replacing Subscription Revenue" Chuck Ganapathi, the CEO of Gainsight & Brett Queener, Managing Director at Bonfire Ventures, who previously ran product at Salesforce and helped destroy Siebel, the company where he and Chuck first met. Together, they've witnessed every major shift in enterprise software over three decades, and th…
  continue reading
 
Sometimes you don t even need to log in Applications using simple, predictable cookies to verify a user s identity are still exploited, and relatively recent vulnerabilities are still due to this very basic mistake. https://isc.sans.edu/diary/%22user%3Dadmin%22.%20Sometimes%20you%20don%27t%20even%20need%20to%20log%20in./32334 Western Digital My Clo…
  continue reading
 
Apple Patches Apple released patches for iOS, macOS, and visionOS, fixing a single font parsing vulnerability https://isc.sans.edu/diary/Apple%20Patches%20Single%20Vulnerability%20CVE-2025-43400/32330 Increase in Scans for Palo Alto Global Protect Vulnerability (CVE-2024-3400). Our honeypots detected an increase in scans for a Palo Alto Global Prot…
  continue reading
 
Converting Timestamps in .bash_history Unix shells offer the ability to add timestamps to commands in the .bash_history file. This is often done in the form of Unix timestamps. This new tool converts these timestamps into a more readable format. https://isc.sans.edu/diary/New%20tool%3A%20convert-ts-bash-history.py/32324 Cisco ASA/FRD Compromises Ex…
  continue reading
 
Webshells Hiding in .well-known Places Our honeypots registered an increase in scans for URLs in the .well-known directory, which appears to be looking for webshells. https://isc.sans.edu/diary/Webshells%20Hiding%20in%20.well-known%20Places/32320 Cisco Patches Critical Exploited Vulnerabilities Cisco released updates addressing already-exploited vu…
  continue reading
 
Exploit Attempts Against Older Hikvision Camera Vulnerability Out honeypots observed an increase in attacks against some older Hikvision issues. A big part of the problem is weak passwords, and the ability to send credentials as part of the URL. https://isc.sans.edu/diary/Exploit%20Attempts%20Against%20Older%20Hikvision%20Camera%20Vulnerability/323…
  continue reading
 
Distracting the Analyst for Fun and Profit Our undergraduate intern, Tyler House analyzed what may have been a small DoS attack that was likely more meant to distract than to actually cause a denial of service https://isc.sans.edu/diary/%5BGuest%20Diary%5D%20Distracting%20the%20Analyst%20for%20Fun%20and%20Profit/32308 GitHub s plan for a more secur…
  continue reading
 
CISA Reports Ivanti EPMM Exploit Sightings Two different organizations submitted backdoors to CISA, which are believed to have been installed using Ivanti vulnerabilities patched in May. https://www.cisa.gov/news-events/analysis-reports/ar25-261a Lastpass Observes Impersonation on GitHub Lastpass noted a number of companies being impersonated via f…
  continue reading
 
Help Wanted: What are these odd requests about? An odd request is hitting a number of our honeypots with a somewhat unusual HTTP request header. Please let me know if you no what the request is about. https://isc.sans.edu/forums/diary/Help+Wanted+What+are+these+odd+reuqests+about/32302/ Forta GoAnywhere MFT Vulnerability Forta s GoAnywhere MFT prod…
  continue reading
 
Exploring Uploads in a Dshield Honeypot Environment This guest diary by one of our SANS.edu undergraduate interns shows how to analyze files uploaded to Cowrie https://isc.sans.edu/diary/Exploring%20Uploads%20in%20a%20Dshield%20Honeypot%20Environment%20%5BGuest%20Diary%5D/32296 Sonicwall Breach SonicWall MySonicWall accounts were breached via crede…
  continue reading
 
CTRL-Z DLL Hooking Attackers may use a simple reload trick to overwrite breakpoints left by analysts to reverse malicious binaries. https://isc.sans.edu/diary/CTRL-Z%20DLL%20Hooking/32294 Global Admin in every Entra ID tenant via Actor tokens As part of September s patch Tuesday, Microsoft patched CVE-2025-55241. The discoverer of the vulnerability…
  continue reading
 
How Disqo Sparked an AI Movement With a Company-Wide Hackathon When everyone was talking about AI but few knew where to start, Disqo took a bold step: they cleared two full days and ran a company-wide AI hackathon. The result? 70 people, 15 teams, and a wave of innovation that’s still driving value today. In this episode, David Karp, Chief Customer…
  continue reading
 
Why You Need Phishing-Resistant Authentication NOW. The recent compromise of a number of high-profile npmjs.com accounts has yet again shown how dangerous a simple phishing email can be. https://isc.sans.edu/diary/Why%20You%20Need%20Phishing%20Resistant%20Authentication%20NOW./32290 S1ngularity/nx Attackers Strike Again A second wave of attacks has…
  continue reading
 
Apple Updates Apple released major updates for all of its operating systems. In addition to new features, these updates patch 33 different vulnerabilities. https://isc.sans.edu/diary/Apple%20Updates%20Everything%20-%20iOS%20macOS%2026%20Edition/32286 Microsoft End of Life October 14th, support for Windows 10, Exchange 2016, and Exchange 2019 will e…
  continue reading
 
Web Searches For Archives Didier observed additional file types being searched for as attackers continue to focus on archive files as they spider web pages https://isc.sans.edu/diary/Web%20Searches%20For%20Archives/32282 FBI Flash Alert: Salesforce Attacks The FBI is alerting users of Salesforce of two different threat actors targeting Salesforce. …
  continue reading
 
DShield SIEM Docker Updates Guy updated the DShield SIEM which graphically summarizes what is happening inside your honeypot. https://isc.sans.edu/diary/DShield%20SIEM%20Docker%20Updates/32276 Again: Sonicwall SSL VPN Compromises The Australian Government s Signals Directorate noted an increase in compromised Sonicwall devices. https://www.cyber.go…
  continue reading
 
BASE64 Over DNS The base64 character set exceeds what is allowable in DNS. However, some implementations will work even with these invalid characters. https://isc.sans.edu/diary/BASE64%20Over%20DNS/32274 Google Chrome Update Google released an update for Google Chrome, addressing two vulnerabilities. One of the vulnerabilities is rated critical and…
  continue reading
 
The Secret Workflow Letting LeeRon Manage 100 Accounts With a 2-Person Team When tasked with managing 100 accounts with just two people, most leaders would immediately start hiring. Not LeeRon Yahalomi. Instead, the VP of Customer Success at Aligned built her own team of AI agents inside ChatGPT that handle customer handoffs, meeting prep, and even…
  continue reading
 
Microsoft Patch Tuesday As part of its September patch Tuesday, Microsoft addressed 177 different vulnerabilities, 86 of which affect Microsoft products. None of the vulnerabilities has been exploited before today. Two of the vulnerabilities were already made public. Microsoft rates 13 of the vulnerabilities are critical. https://isc.sans.edu/diary…
  continue reading
 
Major npm compromise A number of high-profile npm libraries were compromised after developers fell for a phishing email. This compromise affected libraries with a total of hundreds of millions of downloads a week. https://bsky.app/profile/bad-at-computer.bsky.social/post/3lydioq5swk2y https://github.com/orgs/community/discussions/172738 https://git…
  continue reading
 
From YARA Offsets to Virtual Addresses Xavier explains how to convert offsets reported by YARA into offsets suitable for the use with debuggers. https://isc.sans.edu/diary/From%20YARA%20Offsets%20to%20Virtual%20Addresses/32262 Phishing via JavaScript in SVG Files Virustotal uncovered a Colombian phishing campaign that takes advantage of JavaScript …
  continue reading
 
Unauthorized Issuance of Certificate for 1.1.1.1 Cloudflare published a blog post with more details regarding the bad 1.1.1.1 certificate that was issued by Fina. https://blog.cloudflare.com/unauthorized-issuance-of-certificates-for-1-1-1-1/ AI Model Namespace Reuse Deleted accounts on Huggingface can be taken over by other entities unrelated to th…
  continue reading
 
Exploit Attempts for Dassault DELMIA Apriso. CVE-2025-5086 Our honeypots detected attacks against the manufacturing management system DELMIA Apriso. The deserialization vulnerability was patched in June and is one of a few critical vulnerabilities patched in recent months. https://isc.sans.edu/diary/Exploit%20Attempts%20for%20Dassault%20DELMIA%20Ap…
  continue reading
 
How Kalpana, our Enterprise CSM, Scaled Her Book of Business by 40% With AI Kalpana Krishna Kumar, an Enterprise CSM at Gainsight, and Brady Bluhm, Senior Product Manager at Gainsight, join the show to share how they’re reimagining customer success with AI. From Kalpana’s 40% increase in her book of business to Brady’s unlikely journey from child a…
  continue reading
 
A Quick Look at Sextortion at Scale Jan analyzed 1900 different sextortion messages using 205 different Bitcoin addresses to look at the success rate, lifetime, and other metrics defining these campaigns. https://isc.sans.edu/diary/A%20quick%20look%20at%20sextortion%20at%20scale%3A%201%2C900%20messages%20and%20205%20Bitcoin%20addresses%20spanning%2…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play